speed and size optimized cryptographic construct
implementation for driver level encryption software
(for company selling product suite used by a number of fortune
100 companies)

elliptic curve crypto library work and protocol design

perl cryptographic implementation and debugging third party
software

The work ranges from 10,000 line plus library code, writing CC
Security Target documentation and providing a consultant as technical
contact for accreditation, to a few hours well placed advice for
programmers trying to coax buggy crypto software to inter-operate.
Over the last 5 years we have worked on dozens of projects, to date
all have been through word of mouth (this web page is a recent
addition).

Our wealth of experience with diverse cryptography related systems
often means we have answers to what appear tough problems ready to
hand. Experience with system weaknesses and the cryptographic
literature means protocols we design use proven constructs, and avoid
re-introducing known flaws and common traps for the unwary.